How to Configure SSH on Cisco Router in Cisco Packet Tracer | SYSNETTECH Solutions ► Article ► https://goo.gl/Ghmd79 Read More ⬇️
✅ S U B S C R I B E ► http://goo.gl/8d0iG9
This video shows you how to configure SSH on Cisco Router using the Cisco Packet Tracer network simulator program.
To configure SSH on Cisco Packet Tracer:
1. If you have not installed Packet Tracer before, please refer to the following videos.
Windows ➦ https://www.youtube.com/watch?v=pNLhTixgCXg
Linux / Debian ➦ https://www.youtube.com/watch?v=aMnumAyFxCQ
Linux / Linux Mint ➦ https://www.youtube.com/watch?v=VRmN0pDgLgo
Linux / Ubuntu ➦ https://www.youtube.com/watch?v=rwGuAbiGPdc
MacOS High Sierra ➦ https://www.youtube.com/watch?v=cXaqjFukSAI
2. After installing the Cisco Packet Tracer, add two Cisco routers, one Cisco Switch, and a PC in the workspace.
3. Before configuring SSH on Cisco Router, specify an IP block and assign IP addresses to the Cisco Router's interfaces and to the PC.
4. To configure SSH in Cisco Packet Tracer, open the Cisco Router CLI command prompt and run the following commands.
Router(config)# hostname SSHRouter
SSHRouter(config)# interface gigabitethernet 0/0
SSHRouter(config-if)# ip address 192.168.1.1 255.255.255.0
SSHRouter(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up
SSHRouter(config-if)# exit
SSHRouter(config)# ip domain name SSHRouter.com
SSHRouter(config)# crypto key generate rsa
&lt;span style="color: #00ff00;"&gt;The name for the keys will be: SSHRouter.SSHRoutersolutions.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
SSHRouter(config)# ip ssh version 2
*Mar 1 0:6:12.698: %SSH-5-ENABLED: SSH 1.99 has been enabled&lt;/span&gt;
SSHRouter(config)# ip ssh time
SSHRouter(config)# ip ssh time-out 10
SSHRouter(config)# ip ssh authentication-retries 3
SSHRouter(config)# line vty 0 4
SSHRouter(config-line)# login local
SSHRouter(config-line)# privilege level 15
SSHRouter(config-line)# transport input ssh
SSHRouter(config-line)# exit
SSHRouter(config)# username cisco privilege 15 password cisco123
SSHRouter(config)# end
SSHRouter# wr
5. After configuring SSH on Cisco Router, run the following command on PC1's Command Prompt to make an SSH connection over PC1.
➦ ssh -l cisco 192.168.1.1
6. When you have made the SSH connection from the PC to Cisco Router, type the password for the username you created and press Enter.
7. You can see that an SSH connection was established from PC1 to Cisco Router.
8. To make an SSH connection from the Cisco Router to the Cisco Router, run the following command in Privileged Mode.
➦ ssh -l cisco 192.168.1.1
9. After enabling SSH on Cisco Packet Tracer, you can use the following commands to verify SSH.
➦ show ssh
➦ show ip ssh
10. Watch the entire video to configure SSH on Cisco Router using Cisco Packet Tracer.
11. Don't forget to subscribe to our YouTube channel!
➦ http://goo.gl/8d0iG9
────────BEST PRODUCT FOR CISCO TRAINING─────────
✅ Buy ► http://bit.ly/CiscoNetworkingEssentials
───────────────RELATED VIDEOS───────────────
➊ How to Configure Static NAT in Cisco Packet Tracer
➦ https://www.youtube.com/watch?v=ohvGuTPQ1SM
➋ How to Configure EIGRP in Cisco Packet Tracer
➦ https://www.youtube.com/watch?v=vhVmum82qjE
➌ How to Configure OSPF in Cisco Packet Tracer
➦ https://www.youtube.com/watch?v=xF4xd4cEDXg
➍ How to Configure NAT Overload in Cisco Packet Tracer
➦ https://www.youtube.com/watch?v=uF-4cxIJQ_E
➎ How to Configure Telnet on Cisco Router in Cisco Packet Tracer
➦ https://www.youtube.com/watch?v=meBU5RQGY9M
───────────────FOLLOW US───────────────────
✔ Facebook
➦ https://www.facebook.com/SysnettechSolutions/
✔ Google+
➦ https://plus.google.com/u/0/+Tolgabagci/
✔ Twitter
➦ https://twitter.com/SysnettechS/
✔ Pinterest
➦ https://www.pinterest.com/SysnettechS/
✔ Instagram
➦ https://www.instagram.com/sysnettech_solutions/
✔ LinkedIn
➦ https://tr.linkedin.com/in/tolqabaqci/
✔ StumbleUpon
➦ http://www.stumbleupon.com/stumbler/Sysnettech/
███████████████████████████████████████████
⚠️ ⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️
WE DON'T ALLOW VIDEOS ON OUR YOUTUBE CHANNEL TO BE SHARED USING THE API !!!
Even if a video's sharing feature on our YouTube channel is enabled, it does not mean that you will share this video content without permission.
If you do not take this warning into account, we have to send SPAM notification to Google. We will have to use force on the person or website owner who is continuing to spam.
If you embed the video in an article on your website, we may allow it.
Thank you for your understanding.
███████████████████████████████████████████

Packet Tracer - Configuring SSH
Objectives
Part 1: Secure Passwords
Part 2: Encrypt Communications
Part 3: Verify SSH Implementation
Background
SSH should replace Telnet for management connections. Telnet uses insecure plain text communications. SSH provides security for remote connections by providing strong encryption of all transmitted data between devices. In this activity, you will secure a remote switch with password encryption and SSH.
Part 1: Secure Passwords
a. Using the command prompt on PC1, Telnet to S1. The user EXEC and privileged EXEC password is cisco.
b. Save the current configuration so that any mistakes you might make can be reversed by toggling the power for S1.
c. Show the current configuration and note that the passwords are in plain text. Enter the command that encrypts plain text passwords:
____________________________________________________________________________________
d. Verify that the passwords are encrypted.
Part 2: Encrypt Communications
Step 1: Set the IP domain name and generate secure keys.
It is generally not safe to use Telnet, because data is transferred in plain text. Therefore, use SSH whenever it is available.
a. Configure the domain name to be netacad.pka.
b. Secure keys are needed to encrypt the data. Generate the RSA keys using a 1024 key length.
Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access.
a. Create an administrator user with cisco as the password.
b. Configure the VTY lines to check the local username database for login credentials and to only allow SSH for remote access. Remove the existing vty line password.
Part 3: Verify SSH Implementation
a. Exit the Telnet session and attempt to log back in using Telnet. The attempt should fail.
b. Attempt to log in using SSH. Type ssh and press Enter without any parameters to reveal the command usage instructions. Hint: The -l option is the letter “L”, not the number 1.
c. Upon successful login, enter privileged EXEC mode and save the configuration. If you were unable to successfully access S1, toggle the power and begin again at Part 1.

RSA being a public key crypto-system has two keys, the Public key and the Private key. The Encryption is done using one and the decryption is done using the other. Normally, the encryption is done using the Public key and the decryption is done using the Private key. The RSA modulus (explained below) length is called the key length of the cipher. The currently largest factored prime number had 768 bit. As the security of RSA depends on the factoring problem, using a modulus of 1024 bits is a bare minimum. It is recommended to use at least 2048 bits for good security. 4096 bit is pretty much unbreakable, anything beyond 4096 bits is over the top and would also be painfully slow. #selfhostwcf, #p2pnetworkprogramming,#netcorecommerce

How to Configure SSH on Cisco Router in GNS3 | What is SSH | SYSNETTECH Solutions ► Article ► https://goo.gl/dLyJp2 Read More ⬇️
✅ S U B S C R I B E ► http://goo.gl/8d0iG9
This video shows you how to configure SSH (Secure Shell) on Cisco Router using the GNS3 network simulator program.
To configure SSH on GNS3:
1. If you have not installed GNS3 on Windows, Linux or MacOS before, please refer to the following videos.
Windows ➦ https://www.youtube.com/watch?v=uhWt6TPNp-A
Linux / Debian ➦ https://www.youtube.com/watch?v=_HsKS4iwr3M
Linux / Linux Mint ➦ https://www.youtube.com/watch?v=XU6gf_Reiuk
Linux / Ubuntu ➦ https://www.youtube.com/watch?v=8atzceBgN-c
MacOS ➦ https://www.youtube.com/watch?v=MWStTRpwqBY
2. Once you have done the GNS3 setup, add the Cisco Router to GNS3. If you do not know how to do this, please refer to the following article.
Article ➦ https://www.sysnettechsolutions.com/en/gns3/adding-cisco-ios-to-gns3/
3. Add one Cisco Router, Cisco Switch, and Host to the GNS3 workspace to configure SSH on the Cisco Router.
4. Configure the Host settings to add a VMware virtual machine on GNS3. If you do not know how to use a virtual machine in GNS3, please refer to the following article.
Article ➦ https://www.sysnettechsolutions.com/en/gns3/integrate-vmware-with-gns3/
5. Once you have completed the necessary preparations for SSH configuration in GNS3, cable all devices in the workspace.
6. Specify a virtual machine on VMware for the host. Specify a VMnet in the VMware Virtual Network Editor program.
7. Assign an IP address for the VMnet that you created in the network settings of your physical computer.
8. To configure SSH on Cisco Router, open the CLI command prompt and run the following commands.
R1# conf t
R1(config)# interface fastethernet0/0
R1(config-if)# ip address 192.168.8.1 255.255.255.0
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)#ip domain-name sysnettechsolutions.com
R1(config)#crypto key generate rsa general-keys modulus 1024
The name for the keys will be: R1.sysnettechsolutions.com
% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
R1(config)# ip ssh time-out 15
R1(config)# ip ssh authentication-retries 2
R1(config)# ip ssh version 2
R1(config)# username cisco privilege 15 password cisco123
R1(config)# line vty 0 4
R1(config-line)# login local
R1(config-line)# privilege level 15
R1(config-line)# transport input ssh
R1(config-line)# exit
R1(config)# end
R1# wr
9. After you enable SSH on Cisco Router, make an SSH connection to Cisco Router using Putty on the virtual machine. Use the following command to connect from the PC to the Cisco Router via SSH.
➦ ssh -I cisco 192.168.8.1
10. Likewise, you can use the following command in Privileged Mode to connect from the Cisco Router to the Cisco Router via SSH.
➦ ssh -I cisco 192.168.8.1
11. Watch the entire video to configure SSH on Cisco Router using GNS3.
12. Don't forget to subscribe to our YouTube channel.
➦ http://goo.gl/8d0iG9
What is SSH?
Secure Shell (SSH) is a protocol which provides a secure remote access connection to network devices. Communication between the client and server is encrypted in both SSH version 1 and SSH version 2. Implement SSH version 2 when possible because it uses a more enhanced security encryption algorithm.
────────BEST PRODUCT FOR CISCO TRAINING──────────
✅ Buy ► http://bit.ly/CiscoNetworkingEssentials
───────────────RELATED VIDEOS───────────────
➊ How to Configure Telnet on GNS3
➦ https://www.youtube.com/watch?v=eiI_2srAyLM
➋ How to Configure Static NAT on GNS3
➦ https://www.youtube.com/watch?v=2rnXtbEmwes
➌ How to Configure Dynamic NAT on GNS3
➦ https://www.youtube.com/watch?v=CzxXWzY0c1U
➍ How to Configure EIGRP in GNS3
➦ https://www.youtube.com/watch?v=rJC3UERvdnQ
➎ How to Configure OSPF in GNS3
➦ https://www.youtube.com/watch?v=gFMvgpDSzlI
───────────────FOLLOW US───────────────────
✔ Facebook
➦ https://www.facebook.com/SysnettechSolutions/
✔ Google+
➦ https://plus.google.com/u/0/+Tolgabagci/
✔ Twitter
➦ https://twitter.com/SysnettechS/
✔ Pinterest
➦ https://www.pinterest.com/SysnettechS/
✔ Instagram
➦ https://www.instagram.com/sysnettech_solutions/
✔ LinkedIn
➦ https://tr.linkedin.com/in/tolqabaqci/
✔ StumbleUpon
➦ http://www.stumbleupon.com/stumbler/Sysnettech/
███████████████████████████████████████████
⚠️ ⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️
WE DON'T ALLOW VIDEOS ON OUR YOUTUBE CHANNEL TO BE SHARED USING THE API !!!
Even if a video's sharing feature on our YouTube channel is enabled, it does not mean that you will share this video content without permission.
If you do not take this warning into account, we have to send SPAM notification to Google. We will have to use force on the person or website owner who is continuing to spam.
If you embed the video in an article on your website, we may allow it.
Thank you for your understanding.
███████████████████████████████████████████

Banks, Facebook, Twitter and Google use epic numbers - based on prime factors - to keep our Internet secrets. This is RSA public-key encryption.
More links & stuff in full description below ↓↓↓
Gold Vault: https://youtu.be/CTtf5s2HFkA
This video features Dr James Grime (http://singingbanana.com/). Message from James: "Thanks to Dr Chris Hughes of the University of York who showed me how to find the RSA public key from my browser, and showed me how awesome they look when you print them out."
Regarding the keys used for encryption:
x, y prime
Encode key E shares no factors with (x-1)(y-1)
Decode key is D with E*D - 1 a multiple of (x-1)(y-1)
Thanks to Drew Mokris for the animation: http://www.spinnerdisc.com/
NUMBERPHILE
Website: http://www.numberphile.com/
Numberphile on Facebook: http://www.facebook.com/numberphile
Numberphile tweets: https://twitter.com/numberphile
Subscribe: http://bit.ly/Numberphile_Sub
Videos by Brady Haran
Patreon: http://www.patreon.com/numberphile
Brady's videos subreddit: http://www.reddit.com/r/BradyHaran/
Brady's latest videos across all channels: http://www.bradyharanblog.com/
Sign up for (occasional) emails: http://eepurl.com/YdjL9
Numberphile T-Shirts: https://teespring.com/stores/numberphile
Other merchandise: https://store.dftba.com/collections/numberphile

This is a basic configuration of Cisco IOS based CA for handing out self signed certificates to VPN peers. Please note that prior to setting up CA server, all the routers need to be synched up with a NTP server. otherwise certificates get a wrong timestamp and could cause the VPN peering to fail. Hope this has been helpful and thank you.

How to set up Secure Shell (SSH) in Cisco Packet Tracer
What is Secure Shell (SSH) you might ask!?
SSH protocol uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on.
Out side of PT, on a real computer you can use the program called putty to SSH in to your interfaces.

In cryptography, key size or key length is the size measured in bits of the key used in a cryptographic algorithm. An algorithm's key length is distinct from its cryptographic security, which is a logarithmic measure of the fastest known computational attack on the algorithm, also measured in bits. The security of an algorithm cannot exceed its key length, but it can be smaller. For example, Triple DES has a key size of 168 bits but provides at most 112 bits of security, since an attack of complexity 2112 is known. This property of Triple DES is not a weakness provided 112 bits of security is sufficient for an application. Most symmetric-key algorithms in common use are designed to have security equal to their key length. No asymmetric-key algorithms with this property are known; elliptic curve cryptography comes the closest with an effective security of roughly half its key length.
This video is targeted to blind users.
Attribution:
Article text available under CC-BY-SA
Creative Commons image source in video

Enroll to Full Course: https://goo.gl/liK0Oq
Networks#4: The video explains the RSA Algorithm (public key encryption) Concept and Example along with the steps to generate the public and private keys. The video also provides a simple example on how to calculate the keys and how to encrypt and decrypt the messages.
For more, visit http://www.EngineeringMentor.com.
FaceBook: https://www.facebook.com/EngineeringMentor.
Twitter: https://www.twitter.com/Engi_Mentor

RSA is one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it wasn't declassified until 1997.
A user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem.
This video is targeted to blind users.
Attribution:
Article text available under CC-BY-SA
Creative Commons image source in video